DocumentCode :
653776
Title :
CloudSafe: Securing data processing within vulnerable virtualization environments in the cloud
Author :
Huijun Xiong ; Qingji Zheng ; Xinwen Zhang ; Danfeng Yao
Author_Institution :
Dept. of Comput. Sci., Virginia Tech, Blacksburg, VA, USA
fYear :
2013
fDate :
14-16 Oct. 2013
Firstpage :
172
Lastpage :
180
Abstract :
Data protection in public cloud remains a challenging problem. Outsourced data processing on vulnerable cloud platforms may suffer from cross-VM attacks, e.g. side-channel attacks that leak secrecy keys. We design and develop CloudSafe, a general and practical data-protection solution by integrating cryptographic techniques and systematic mechanisms seamlessly to address this issue. CloudSafe first allows a data owner to outsource encrypted data in the cloud. It then employs a cloud-based proxy to re-encrypt stored encrypted data and delivers it to authorized cloud applications upon access requests. To combat cross-VM side-channel attacks, the final data decryption key is one-time use and can be retrieved from the data owner ondemand. Any key leakage after an authorized access cannot compromise data confidentiality. For data sharing, CloudSafe allows authorized applications to efficiently access the protected data. The prototype evaluation demonstrates the efficiency of the scheme towards large-scale cloud applications.
Keywords :
authorisation; cloud computing; cryptography; virtual machines; virtualisation; CloudSafe; access requests; authorized cloud applications; cloud-based proxy; cross-VM side-channel attacks; cryptographic techniques; data confidentiality; data decryption key; data processing security; data-protection solution; large-scale cloud applications; outsourced data processing; public cloud; secrecy keys; stored encrypted data reencryption; systematic mechanisms; vulnerable cloud platforms; vulnerable virtualization environments; Cloud computing; Encryption; Servers; Virtual machine monitors; Virtualization; cloud security; one-time key; outsourced computation; proxy re-encryption; side-channel attack;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Communications and Network Security (CNS), 2013 IEEE Conference on
Conference_Location :
National Harbor, MD
Type :
conf
DOI :
10.1109/CNS.2013.6682705
Filename :
6682705
Link To Document :
بازگشت